CA2950677A1 - Network element and method for improved access to communication networks - Google Patents
Network element and method for improved access to communication networks Download PDFInfo
- Publication number
- CA2950677A1 CA2950677A1 CA2950677A CA2950677A CA2950677A1 CA 2950677 A1 CA2950677 A1 CA 2950677A1 CA 2950677 A CA2950677 A CA 2950677A CA 2950677 A CA2950677 A CA 2950677A CA 2950677 A1 CA2950677 A1 CA 2950677A1
- Authority
- CA
- Canada
- Prior art keywords
- network
- user
- access
- identifier
- router
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000004891 communication Methods 0.000 title claims abstract description 104
- 238000000034 method Methods 0.000 title claims abstract description 79
- 238000012795 verification Methods 0.000 claims abstract description 53
- 230000002155 anti-virotic effect Effects 0.000 claims description 69
- 230000009471 action Effects 0.000 claims description 15
- 241000700605 Viruses Species 0.000 claims description 12
- 238000004458 analytical method Methods 0.000 claims description 4
- 230000000903 blocking effect Effects 0.000 claims description 3
- GNFTZDOKVXKIBK-UHFFFAOYSA-N 3-(2-methoxyethoxy)benzohydrazide Chemical compound COCCOC1=CC=CC(C(=O)NN)=C1 GNFTZDOKVXKIBK-UHFFFAOYSA-N 0.000 claims description 2
- FGUUSXIOTUKUDN-IBGZPJMESA-N C1(=CC=CC=C1)N1C2=C(NC([C@H](C1)NC=1OC(=NN=1)C1=CC=CC=C1)=O)C=CC=C2 Chemical compound C1(=CC=CC=C1)N1C2=C(NC([C@H](C1)NC=1OC(=NN=1)C1=CC=CC=C1)=O)C=CC=C2 FGUUSXIOTUKUDN-IBGZPJMESA-N 0.000 claims description 2
- 238000004590 computer program Methods 0.000 claims description 2
- 230000007246 mechanism Effects 0.000 abstract description 58
- 230000008569 process Effects 0.000 description 29
- 239000003795 chemical substances by application Substances 0.000 description 20
- 230000008859 change Effects 0.000 description 11
- 238000007726 management method Methods 0.000 description 11
- 230000000694 effects Effects 0.000 description 10
- 230000006870 function Effects 0.000 description 9
- 230000003068 static effect Effects 0.000 description 8
- 230000006872 improvement Effects 0.000 description 6
- 230000001360 synchronised effect Effects 0.000 description 6
- 230000001276 controlling effect Effects 0.000 description 4
- 238000010586 diagram Methods 0.000 description 4
- 230000010354 integration Effects 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- 101100435070 Saccharomyces cerevisiae (strain ATCC 204508 / S288c) APN2 gene Proteins 0.000 description 3
- 101100268779 Solanum lycopersicum ACO1 gene Proteins 0.000 description 3
- 230000008901 benefit Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 238000001914 filtration Methods 0.000 description 3
- ZXQYGBMAQZUVMI-GCMPRSNUSA-N gamma-cyhalothrin Chemical compound CC1(C)[C@@H](\C=C(/Cl)C(F)(F)F)[C@H]1C(=O)O[C@H](C#N)C1=CC=CC(OC=2C=CC=CC=2)=C1 ZXQYGBMAQZUVMI-GCMPRSNUSA-N 0.000 description 3
- 230000003993 interaction Effects 0.000 description 3
- 230000000670 limiting effect Effects 0.000 description 3
- 230000001681 protective effect Effects 0.000 description 3
- 229920006395 saturated elastomer Polymers 0.000 description 3
- 206010003830 Automatism Diseases 0.000 description 2
- 241000282414 Homo sapiens Species 0.000 description 2
- 230000006399 behavior Effects 0.000 description 2
- 230000001010 compromised effect Effects 0.000 description 2
- 230000001419 dependent effect Effects 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 230000018109 developmental process Effects 0.000 description 2
- 238000009826 distribution Methods 0.000 description 2
- 238000013467 fragmentation Methods 0.000 description 2
- 238000006062 fragmentation reaction Methods 0.000 description 2
- 208000015181 infectious disease Diseases 0.000 description 2
- 238000009434 installation Methods 0.000 description 2
- 230000015654 memory Effects 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000008520 organization Effects 0.000 description 2
- 230000003449 preventive effect Effects 0.000 description 2
- 230000007480 spreading Effects 0.000 description 2
- 238000003892 spreading Methods 0.000 description 2
- 101150012579 ADSL gene Proteins 0.000 description 1
- 102100020775 Adenylosuccinate lyase Human genes 0.000 description 1
- 108700040193 Adenylosuccinate lyases Proteins 0.000 description 1
- 208000001613 Gambling Diseases 0.000 description 1
- 241000282412 Homo Species 0.000 description 1
- 101001094649 Homo sapiens Popeye domain-containing protein 3 Proteins 0.000 description 1
- 101000608234 Homo sapiens Pyrin domain-containing protein 5 Proteins 0.000 description 1
- 101000578693 Homo sapiens Target of rapamycin complex subunit LST8 Proteins 0.000 description 1
- 101100513046 Neurospora crassa (strain ATCC 24698 / 74-OR23-1A / CBS 708.71 / DSM 1257 / FGSC 987) eth-1 gene Proteins 0.000 description 1
- 102100027802 Target of rapamycin complex subunit LST8 Human genes 0.000 description 1
- 238000012550 audit Methods 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000000295 complement effect Effects 0.000 description 1
- 230000001143 conditioned effect Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000008260 defense mechanism Effects 0.000 description 1
- 238000009795 derivation Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000008034 disappearance Effects 0.000 description 1
- 239000003814 drug Substances 0.000 description 1
- 229940079593 drug Drugs 0.000 description 1
- 230000003203 everyday effect Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 238000002955 isolation Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
- 230000036961 partial effect Effects 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
- 238000010223 real-time analysis Methods 0.000 description 1
- 230000002829 reductive effect Effects 0.000 description 1
- 230000001105 regulatory effect Effects 0.000 description 1
- 230000011218 segmentation Effects 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
- 230000009385 viral infection Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/22—Indexing; Data structures therefor; Storage structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L49/00—Packet switching elements
- H04L49/20—Support for services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/50—Address allocation
- H04L61/5007—Internet protocol [IP] addresses
- H04L61/5014—Internet protocol [IP] addresses using dynamic host configuration protocol [DHCP] or bootstrap protocol [BOOTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0236—Filtering by address, protocol, port number or service, e.g. IP-address or URL
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/107—Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/162—Implementing security features at a particular protocol layer at the data link layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/16—Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
- H04L69/161—Implementation details of TCP/IP or UDP/IP stack architecture; Specification of modified or new header fields
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/16—Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
- H04L69/163—In-band adaptation of TCP data exchange; In-band control procedures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/16—Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
- H04L69/168—Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP] specially adapted for link layer protocols, e.g. asynchronous transfer mode [ATM], synchronous optical network [SONET] or point-to-point protocol [PPP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/30—Definitions, standards or architectural aspects of layered protocol stacks
- H04L69/32—Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/30—Definitions, standards or architectural aspects of layered protocol stacks
- H04L69/32—Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
- H04L69/322—Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions
- H04L69/326—Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the transport layer [OSI layer 4]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2101/00—Indexing scheme associated with group H04L61/00
- H04L2101/60—Types of network addresses
- H04L2101/618—Details of network addresses
- H04L2101/622—Layer-2 addresses, e.g. medium access control [MAC] addresses
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/30—Definitions, standards or architectural aspects of layered protocol stacks
- H04L69/32—Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
- H04L69/322—Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions
- H04L69/324—Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the data link layer [OSI layer 2], e.g. HDLC
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Power Engineering (AREA)
- Databases & Information Systems (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Data Mining & Analysis (AREA)
- Bioethics (AREA)
- Virology (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Small-Scale Networks (AREA)
- Computer And Data Communications (AREA)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
ESP201430822 | 2014-05-29 | ||
ES201430822A ES2552675B1 (es) | 2014-05-29 | 2014-05-29 | Método de enrutamiento con seguridad y autentificación a nivel de tramas |
PCT/ES2015/070423 WO2015181431A1 (es) | 2014-05-29 | 2015-05-29 | Método y elemento de red para el acceso mejorado a redes de comunicación |
Publications (1)
Publication Number | Publication Date |
---|---|
CA2950677A1 true CA2950677A1 (en) | 2015-12-03 |
Family
ID=53525204
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA2950677A Abandoned CA2950677A1 (en) | 2014-05-29 | 2015-05-29 | Network element and method for improved access to communication networks |
Country Status (9)
Country | Link |
---|---|
US (3) | US20170230350A1 (pt) |
EP (3) | EP3151506A1 (pt) |
KR (3) | KR20170015340A (pt) |
AU (1) | AU2015265782B2 (pt) |
CA (1) | CA2950677A1 (pt) |
ES (2) | ES2552675B1 (pt) |
MX (1) | MX359691B (pt) |
PT (1) | PT3151505T (pt) |
WO (3) | WO2015181431A1 (pt) |
Families Citing this family (69)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102014107793B9 (de) * | 2014-06-03 | 2018-05-09 | Fujitsu Technology Solutions Intellectual Property Gmbh | Verfahren zur Weiterleitung von Daten zwischen Computersystemen, Computernetz-Infrastruktur sowie Computerprogramm-Produkt |
US10114351B2 (en) * | 2015-03-05 | 2018-10-30 | Google Llc | Smart-home automation system that suggests or autmatically implements selected household policies based on sensed observations |
CN106211152B (zh) * | 2015-04-30 | 2019-09-06 | 新华三技术有限公司 | 一种无线接入认证方法及装置 |
US11265312B2 (en) * | 2015-05-26 | 2022-03-01 | Areawfi, Integrated System S.R.L. | Telecommunication system for the secure transmission of data therein and device associated therewith |
FR3038421B1 (fr) * | 2015-06-30 | 2017-08-18 | Oberthur Technologies | Procede de gestion de profils dans un element securise |
CN106375102B (zh) * | 2015-07-22 | 2019-08-27 | 华为技术有限公司 | 一种服务注册方法、使用方法及相关装置 |
CN105162728B (zh) * | 2015-07-31 | 2018-07-31 | 小米科技有限责任公司 | 网络接入方法、设备及系统 |
US10200342B2 (en) | 2015-07-31 | 2019-02-05 | Nicira, Inc. | Dynamic configurations based on the dynamic host configuration protocol |
US10237351B2 (en) * | 2015-11-23 | 2019-03-19 | Dojo-Labs Ltd | Sub-networks based security method, apparatus and product |
FR3044848B1 (fr) * | 2015-12-03 | 2019-08-23 | Overkiz | Procede de configuration, de controle ou de supervision d’une installation domotique |
US10044674B2 (en) * | 2016-01-04 | 2018-08-07 | Afero, Inc. | System and method for automatic wireless network authentication in an internet of things (IOT) system |
US10440025B2 (en) | 2016-06-07 | 2019-10-08 | Gryphon Online Safety, Inc | Remotely controlling access to online content |
US11301572B2 (en) | 2016-02-27 | 2022-04-12 | Gryphon Online Safety, Inc. | Remotely controlling access to online content |
US10212167B2 (en) * | 2016-02-27 | 2019-02-19 | Gryphon Online Safety, Inc. | Method and system to enable controlled safe internet browsing |
US10353880B2 (en) * | 2016-03-14 | 2019-07-16 | Wipro Limited | System and method for governing performances of multiple hardware devices |
EP3430775B1 (en) * | 2016-03-17 | 2024-07-10 | Johann Schlamp | Constructible automata for internet routes |
US10547588B2 (en) * | 2016-04-30 | 2020-01-28 | Nicira, Inc. | Method of translating a logical switch into a set of network addresses |
EP3253020A1 (en) * | 2016-06-03 | 2017-12-06 | Gemalto Sa | A method and an apparatus for publishing assertions in a distributed database of a mobile telecommunication network |
US10645057B2 (en) * | 2016-06-22 | 2020-05-05 | Cisco Technology, Inc. | Domain name system identification and attribution |
US20180013618A1 (en) * | 2016-07-11 | 2018-01-11 | Aruba Networks, Inc. | Domain name system servers for dynamic host configuration protocol clients |
US10397303B1 (en) * | 2016-08-29 | 2019-08-27 | Amazon Technologies, Inc. | Semantic annotation and translations for devices |
DE102016116077A1 (de) | 2016-08-29 | 2018-03-01 | Unify Patente Gmbh & Co. Kg | Verfahren zum Zuweisen einer MAC-Adresse zu einem Kommunikationsgerät in einer Netzwerkumgebung und Datenbank mit MAC-Adressen |
US10097517B2 (en) * | 2016-09-01 | 2018-10-09 | Cybersight, Inc. | Secure tunnels for the internet of things |
US10498712B2 (en) | 2016-11-10 | 2019-12-03 | Ernest Brickell | Balancing public and personal security needs |
US10855465B2 (en) | 2016-11-10 | 2020-12-01 | Ernest Brickell | Audited use of a cryptographic key |
US11405201B2 (en) | 2016-11-10 | 2022-08-02 | Brickell Cryptology Llc | Secure transfer of protected application storage keys with change of trusted computing base |
US11398906B2 (en) | 2016-11-10 | 2022-07-26 | Brickell Cryptology Llc | Confirming receipt of audit records for audited use of a cryptographic key |
WO2018203902A1 (en) * | 2017-05-04 | 2018-11-08 | Ernest Brickell | Assuring external accessibility for devices on a network |
US10348706B2 (en) | 2017-05-04 | 2019-07-09 | Ernest Brickell | Assuring external accessibility for devices on a network |
US10652245B2 (en) | 2017-05-04 | 2020-05-12 | Ernest Brickell | External accessibility for network devices |
US10129255B1 (en) | 2017-05-12 | 2018-11-13 | International Business Machines Corporation | Device authentication with MAC address and time period |
US10419445B2 (en) * | 2017-07-03 | 2019-09-17 | Sap Se | Credential change management system |
US10609064B2 (en) * | 2017-07-06 | 2020-03-31 | Bank Of America Corporation | Network device access control and information security |
EP3944594A1 (en) | 2017-09-08 | 2022-01-26 | Convida Wireless, LLC | Automated service enrollment in a machine-to-machine communications network |
US10887316B2 (en) | 2017-10-27 | 2021-01-05 | Cleverdome, Inc. | Software defined network for creating a trusted network system |
FR3076142A1 (fr) * | 2017-12-21 | 2019-06-28 | Bull Sas | Procede et serveur d'attribution d'adresses topologiques a des commutateurs de reseau, programme d'ordinateur et grappe de serveurs correspondants |
US20190215368A1 (en) * | 2018-01-06 | 2019-07-11 | Jacqueline Thanh-Thao Do | Internet of Things (“IoT”)-Enabled Toothbrush Device to Monitor Human Vital Signs |
WO2019194787A1 (en) * | 2018-04-02 | 2019-10-10 | Visa International Service Association | Real-time entity anomaly detection |
US10855674B1 (en) * | 2018-05-10 | 2020-12-01 | Microstrategy Incorporated | Pre-boot network-based authentication |
US11290459B2 (en) * | 2018-05-15 | 2022-03-29 | Lenovo Enterprise Solutions (Singapore) Pte. Ltd. | Granting guest devices access to a network using out-of-band authorization |
US11068600B2 (en) * | 2018-05-21 | 2021-07-20 | Kct Holdings, Llc | Apparatus and method for secure router with layered encryption |
US11212178B2 (en) * | 2018-06-05 | 2021-12-28 | Toshiba Client Solutions CO., LTD. | Control system, electronic device, and control method |
US10938821B2 (en) * | 2018-10-31 | 2021-03-02 | Dell Products L.P. | Remote access controller support registration system |
CN109286637B (zh) * | 2018-11-19 | 2021-05-14 | 南京邮电大学 | 一种D-LinkDir系列路由器配置接口漏洞的防御方法 |
US11146565B2 (en) * | 2018-11-28 | 2021-10-12 | Motorola Mobility Llc | Mobile electronic communications device having multiple device paths |
US11075877B2 (en) | 2019-01-11 | 2021-07-27 | Charter Communications Operating, Llc | System and method for remotely filtering network traffic of a customer premise device |
US11063982B2 (en) * | 2019-01-25 | 2021-07-13 | Unisys Corporation | Object scope definition for enterprise security management tool |
US11218440B2 (en) * | 2019-04-30 | 2022-01-04 | Hewlett Packard Enterprise Development Lp | Contiguous subnet IP address allocation |
CN113692563A (zh) * | 2019-06-27 | 2021-11-23 | 苹果公司 | 基于目标观众来修改现有内容 |
KR20210065513A (ko) * | 2019-11-27 | 2021-06-04 | 휴렛-팩커드 디벨롭먼트 컴퍼니, 엘.피. | 화상 형성 장치의 네트워크 보안 설정 |
JP7419973B2 (ja) * | 2020-06-01 | 2024-01-23 | トヨタ自動車株式会社 | 情報処理装置、情報処理方法、プログラム、及び携帯装置 |
US11983695B1 (en) * | 2020-06-02 | 2024-05-14 | United Services Automobile Association (Usaa) | Authentication of a remote customer using probabilistic locations of WiFi signals |
CA3177385A1 (en) | 2020-06-29 | 2022-01-06 | Prabhu PALANISAMY | Policy-based genomic data sharing for software-as-a-service tenants |
JP2023532297A (ja) * | 2020-06-29 | 2023-07-27 | イルミナ インコーポレイテッド | セキュアな発見フレームワークを介した一時的なクラウドプロバイダクレデンシャル |
CN111932780B (zh) * | 2020-07-11 | 2022-03-04 | 南京理工大学 | 一种基于区块链技术的电力管理系统 |
CN114095424A (zh) * | 2020-08-07 | 2022-02-25 | 艾锐势企业有限责任公司 | 路由器、用于路由器的方法、计算机可读介质以及装置 |
US11457012B2 (en) | 2020-11-03 | 2022-09-27 | Okta, Inc. | Device risk level based on device metadata comparison |
US11361630B1 (en) | 2020-11-20 | 2022-06-14 | Bank Of America Corporation | Identifying and logging mobile devices posing security threats |
US11882452B2 (en) | 2020-11-20 | 2024-01-23 | Bank Of America Corporation | Monitoring for security threats associated with mobile devices that have been identified and logged |
US11601399B2 (en) | 2021-01-20 | 2023-03-07 | Bank Of America Corporation | System and method for detecting forbidden network accesses based on zone connectivity mapping |
KR20220135623A (ko) * | 2021-03-31 | 2022-10-07 | 삼성전자주식회사 | 외부 전자 장치의 ip 주소를 할당하는 전자 장치 및 전자 장치의 동작 방법 |
US11949652B2 (en) * | 2021-03-31 | 2024-04-02 | Samsung Electronics Co., Ltd. | Transmitting router advertisements based on identification information of external devices |
KR102479425B1 (ko) * | 2021-06-18 | 2022-12-20 | 주식회사 이너트론 | 유무선 네트워크의 불법 디바이스 검출 및 차단 방법과 장치 |
US11929981B2 (en) * | 2021-09-15 | 2024-03-12 | Honeywell International Inc. | Batch assignment of IP addresses in a building control network |
CN114979738B (zh) * | 2022-05-17 | 2023-03-14 | 深圳市旭联信息技术有限公司 | 无线投屏方法、接收器及存储介质 |
CN115208683B (zh) * | 2022-07-26 | 2023-05-26 | 北京航天驭星科技有限公司 | 一种基于航天云服务的权限分配方法和权限分配装置 |
US20240056806A1 (en) * | 2022-08-12 | 2024-02-15 | Hewlett Packard Enterprise Development Lp | Device authorization in an enterprise network based on whether a mobile number is in a user information repository |
US20240187411A1 (en) * | 2022-12-04 | 2024-06-06 | Asad Hasan | Human system operator identity associated audit trail of containerized network application with prevention of privilege escalation, online black-box testing, and related systems and methods |
KR20240088158A (ko) * | 2022-12-13 | 2024-06-20 | 주식회사 이너트론 | 불법 디바이스 검출차단장치 |
Family Cites Families (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6393484B1 (en) * | 1999-04-12 | 2002-05-21 | International Business Machines Corp. | System and method for controlled access to shared-medium public and semi-public internet protocol (IP) networks |
US6981143B2 (en) * | 2001-11-28 | 2005-12-27 | International Business Machines Corporation | System and method for providing connection orientation based access authentication |
US20030220994A1 (en) * | 2002-02-28 | 2003-11-27 | Chunrong Zhu | Wireless network access system and method |
US7533412B2 (en) * | 2002-04-23 | 2009-05-12 | Stmicroelectronics S.A. | Processor secured against traps |
US7249187B2 (en) * | 2002-11-27 | 2007-07-24 | Symantec Corporation | Enforcement of compliance with network security policies |
US7735114B2 (en) * | 2003-09-04 | 2010-06-08 | Foundry Networks, Inc. | Multiple tiered network security system, method and apparatus using dynamic user policy assignment |
WO2005091159A1 (en) | 2004-03-24 | 2005-09-29 | Exers Technologies. Inc. | Authentication system being capable of controlling authority based of user and authenticator. |
KR100667333B1 (ko) * | 2004-12-16 | 2007-01-12 | 삼성전자주식회사 | 홈 네트워크에서 디바이스 및 사용자 인증 시스템 및 방법 |
US7568092B1 (en) * | 2005-02-09 | 2009-07-28 | Sun Microsystems, Inc. | Security policy enforcing DHCP server appliance |
US20070220252A1 (en) * | 2005-06-06 | 2007-09-20 | Sinko Michael J | Interactive network access controller |
US7574202B1 (en) * | 2006-07-21 | 2009-08-11 | Airsurf Wireless Inc. | System and methods for a secure and segregated computer network |
JP4347335B2 (ja) * | 2006-12-18 | 2009-10-21 | 富士通株式会社 | ネットワーク中継プログラム、ネットワーク中継装置、通信システム、ネットワーク中継方法 |
US7966650B2 (en) | 2008-02-22 | 2011-06-21 | Sophos Plc | Dynamic internet address assignment based on user identity and policy compliance |
US8891358B2 (en) * | 2008-10-16 | 2014-11-18 | Hewlett-Packard Development Company, L.P. | Method for application broadcast forwarding for routers running redundancy protocols |
US9047458B2 (en) * | 2009-06-19 | 2015-06-02 | Deviceauthority, Inc. | Network access protection |
US9119070B2 (en) * | 2009-08-31 | 2015-08-25 | Verizon Patent And Licensing Inc. | Method and system for detecting unauthorized wireless devices |
US8745758B2 (en) * | 2009-11-02 | 2014-06-03 | Time Warner Cable Enterprises Llc | Apparatus and methods for device authorization in a premises network |
US10129751B2 (en) * | 2012-05-25 | 2018-11-13 | Comcast Cable Communications, Llc | Wireless gateway supporting public and private networks |
WO2014039047A1 (en) * | 2012-09-07 | 2014-03-13 | Nokia Corporation | Methods and apparatus for network sharing control |
-
2014
- 2014-05-29 US US15/314,381 patent/US20170230350A1/en not_active Abandoned
- 2014-05-29 ES ES201430822A patent/ES2552675B1/es not_active Expired - Fee Related
-
2015
- 2015-05-29 KR KR1020167035843A patent/KR20170015340A/ko not_active Application Discontinuation
- 2015-05-29 AU AU2015265782A patent/AU2015265782B2/en not_active Ceased
- 2015-05-29 WO PCT/ES2015/070423 patent/WO2015181431A1/es active Application Filing
- 2015-05-29 EP EP15738129.4A patent/EP3151506A1/en not_active Withdrawn
- 2015-05-29 WO PCT/ES2015/070422 patent/WO2015181430A1/es active Application Filing
- 2015-05-29 US US15/314,725 patent/US10257186B2/en not_active Expired - Fee Related
- 2015-05-29 KR KR1020167035995A patent/KR20170016878A/ko unknown
- 2015-05-29 EP EP15735721.1A patent/EP3151505B1/en not_active Not-in-force
- 2015-05-29 US US15/314,915 patent/US10129246B2/en not_active Expired - Fee Related
- 2015-05-29 CA CA2950677A patent/CA2950677A1/en not_active Abandoned
- 2015-05-29 ES ES15735721.1T patent/ES2673938T3/es active Active
- 2015-05-29 MX MX2016015592A patent/MX359691B/es active IP Right Grant
- 2015-05-29 PT PT157357211T patent/PT3151505T/pt unknown
- 2015-05-29 EP EP15735720.3A patent/EP3151144A1/en not_active Withdrawn
- 2015-05-29 WO PCT/ES2015/070421 patent/WO2015181429A1/es active Application Filing
- 2015-05-29 KR KR1020167035695A patent/KR20170013298A/ko unknown
Also Published As
Publication number | Publication date |
---|---|
AU2015265782B2 (en) | 2018-12-06 |
MX2016015592A (es) | 2017-07-13 |
WO2015181431A1 (es) | 2015-12-03 |
WO2015181430A1 (es) | 2015-12-03 |
MX359691B (es) | 2018-10-04 |
US20170230350A1 (en) | 2017-08-10 |
EP3151144A1 (en) | 2017-04-05 |
EP3151505B1 (en) | 2018-03-28 |
US10257186B2 (en) | 2019-04-09 |
EP3151506A1 (en) | 2017-04-05 |
WO2015181429A1 (es) | 2015-12-03 |
KR20170013298A (ko) | 2017-02-06 |
US20170195162A1 (en) | 2017-07-06 |
AU2015265782A1 (en) | 2016-12-22 |
ES2552675B1 (es) | 2016-10-10 |
PT3151505T (pt) | 2018-06-29 |
ES2552675A1 (es) | 2015-12-01 |
EP3151505A1 (en) | 2017-04-05 |
ES2673938T3 (es) | 2018-06-26 |
US10129246B2 (en) | 2018-11-13 |
KR20170016878A (ko) | 2017-02-14 |
KR20170015340A (ko) | 2017-02-08 |
US20170187703A1 (en) | 2017-06-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2015265782B2 (en) | Method and network element for improved access to communication networks | |
US10382436B2 (en) | Network security based on device identifiers and network addresses | |
US10630725B2 (en) | Identity-based internet protocol networking | |
US10542006B2 (en) | Network security based on redirection of questionable network access | |
US9723019B1 (en) | Infected endpoint containment using aggregated security status information | |
CN109964196B (zh) | 多因素认证作为网络服务 | |
US7966650B2 (en) | Dynamic internet address assignment based on user identity and policy compliance | |
WO2017084446A1 (zh) | 无线路由器登录管理方法及装置 | |
US9231911B2 (en) | Per-user firewall | |
US11405399B2 (en) | Method of protecting mobile devices from vulnerabilities like malware, enabling content filtering, screen time restrictions and other parental control rules while on public network by forwarding the internet traffic to a smart, secured home router | |
US20210314297A1 (en) | System and method for providing application isolation on a physical, virtual or containerized network or host machine | |
US11363457B2 (en) | System and method for providing a secure VLAN within a wireless network | |
WO2018116123A1 (en) | Protecting against unauthorized access to iot devices | |
US20160127316A1 (en) | Highly secure firewall system | |
Thapa | Mitigating Threats in IoT Network Using Device Isolation | |
Pradana et al. | The dhcp snooping and dhcp alert method in securing dhcp server from dhcp rogue attack | |
Aslam et al. | Enhancing security of cloud using static IP techniques | |
Annuar et al. | Enhancement and implementation of network access control architecture for virtualization environments | |
US11743264B2 (en) | Method of protecting mobile devices from vulnerabilities like malware, enabling content filtering, screen time restrictions and other parental control rules while on public network by forwarding the internet traffic to a smart, secured home router | |
Pecena | Can I Really Protect My Broadcast Plant From a Cybersecurity Attack? | |
Chelladurai | Significance of Firewall and its Practicality In Corporate Environment | |
Sarjiyus et al. | Simulation of an Enhanced Network Security Framework for Federal Polytechnic Mubi | |
Roelofs | Feasibility Study NAC for Vanderlande Industries |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request |
Effective date: 20200520 |
|
FZDE | Discontinued |
Effective date: 20221025 |
|
FZDE | Discontinued |
Effective date: 20221025 |